城市(city): unknown
省份(region): unknown
国家(country): Canada
运营商(isp): Telus
主机名(hostname): unknown
机构(organization): TELUS Communications Inc.
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 204.191.29.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21406
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;204.191.29.139. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019062100 1800 900 604800 86400
;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jun 21 17:15:23 CST 2019
;; MSG SIZE rcvd: 118
Host 139.29.191.204.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server: 67.207.67.3
Address: 67.207.67.3#53
** server can't find 139.29.191.204.in-addr.arpa: SERVFAIL
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
158.46.127.222 | attackspambots | spam |
2020-01-10 20:33:07 |
97.90.49.141 | attackbotsspam | spam |
2020-01-10 20:24:29 |
63.81.87.175 | attack | Jan 10 05:48:09 grey postfix/smtpd\[18402\]: NOQUEUE: reject: RCPT from health.jcnovel.com\[63.81.87.175\]: 554 5.7.1 Service unavailable\; Client host \[63.81.87.175\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[63.81.87.175\]\; from=\ |
2020-01-10 20:01:53 |
106.111.210.25 | attack | spam |
2020-01-10 20:36:28 |
108.162.237.82 | attack | 8080/tcp 8443/tcp... [2019-11-22/2020-01-10]16pkt,2pt.(tcp) |
2020-01-10 20:21:34 |
171.224.74.182 | attack | Jan 10 05:47:57 grey postfix/smtpd\[29272\]: NOQUEUE: reject: RCPT from unknown\[171.224.74.182\]: 554 5.7.1 Service unavailable\; Client host \[171.224.74.182\] blocked using dul.dnsbl.sorbs.net\; Dynamic IP Addresses See: http://www.sorbs.net/lookup.shtml\?171.224.74.182\; from=\ |
2020-01-10 20:14:11 |
167.249.170.26 | attackspam | spam |
2020-01-10 20:23:20 |
145.255.28.2 | attack | spam |
2020-01-10 20:33:33 |
185.226.113.180 | attackspam | spam |
2020-01-10 20:30:49 |
159.203.201.125 | attackspambots | spam |
2020-01-10 20:32:43 |
92.62.131.124 | attackbotsspam | SSH bruteforce (Triggered fail2ban) |
2020-01-10 20:03:03 |
49.49.17.170 | attackbots | Scanning random ports - tries to find possible vulnerable services |
2020-01-10 20:20:53 |
81.109.144.235 | attackspam | Jan 10 10:28:16 hosting180 sshd[21035]: Invalid user plx from 81.109.144.235 port 38664 ... |
2020-01-10 20:19:10 |
218.255.6.106 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-01-10 20:20:25 |
186.146.2.111 | attackspam | [ER hit] Tried to deliver spam. Already well known. |
2020-01-10 20:30:02 |